• Even utility tools used by database administrators can be security concerns if the tenants can use them to access, or worse yet, manipulate data that does not belong to them.

    即使是数据库管理员使用实用工具引起安全问题如果租户可以使用它们访问或者糟,操作属于它们的数据的话

    youdao

  • Security labels are database objects applied to rows and columns in order to protect data, and granted to users to give them access to protected data.

    安全标签应用保护数据数据库对象,将安全标签用户他们可以访问保护的数据。

    youdao

  • Similarly, each database user is assigned a security label that determines which labeled data rows or columns he or she can access.

    类似地每个数据库用户也都赋予一个安全标签这个标签将决定/可以访问哪些贴了标签数据

    youdao

  • The security attributes of trusted context can be tuned to ensure air-tight access to the database servers.

    可以通过调优受信任上下文安全属性确保数据库服务器无懈可击访问

    youdao

  • Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.

    或许需要访问现有库存控制系统客户数据库基于大型机安全性访问控制服务

    youdao

  • The database security administrator allows users access to protected data by granting them security labels.

    数据库安全管理员通过用户授予安全标签来允许他们访问受保护数据

    youdao

  • In addition to authentication issues, threats to the security of a database server involve unauthorized access to sensitive information.

    除了认证问题外,能够数据库服务器安全形成威胁还包括敏感信息未经授权访问

    youdao

  • Security of the database access relies on a JDBC driver and a database implementation.

    数据库访问安全依赖JDBC驱动程序数据库实现

    youdao

  • Similarly, each database user is assigned a security label that determines which labeled data (rows or columns) he or she can access.

    类似地每个数据库用户赋予一个安全标签标签决定/可以访问具有哪种标签数据)。

    youdao

  • Using the instance owner id "db2inst1" for database access is not recommended due to security reason.

    出于安全原因推荐使用实例所有者id "db2inst1" 进行数据库访问

    youdao

  • LBAC is an implementation of Mandatory Access Control (MAC), which provides a reasonable level of security assurance for sensitive data stored in database.

    LBACMandatoryAccessControl (MAC)一个实现存储在数据库中的敏感数据提供了较高级别的安全保障

    youdao

  • By depending on this single point of access, security can be added to RDBMS Web applications before database access.

    通过依赖这个单一访问,在访问数据库之前可以rdbmsWeb应用程序添加安全性

    youdao

  • As part of the DB2 9.5 database roles enhancement to Label-based access control (LBAC), you might grant or revoke security labels or exemptions to or from a role or a group.

    作为基于标签访问控制(LBAC)的DB 2 Viper 2数据库角色增强一部分可以对一个角色授予收回安全标签豁免权

    youdao

  • More database security: a new security feature called Label-Based access control (LBAC) allows you to control data access at the row and column level.

    增强了数据库安全性:基于标签的访问控制(Label BasedAccess Control,LBAC)是一种新的安全特性它使可以在行级别上控制数据访问。

    youdao

  • Similarly, storing the database or database-access information on the machine on which the Web server is running can introduce security problems if that system is penetrated and compromised.

    同样如果系统侵入并受到破坏,那么数据库数据库访问信息存储正在运行Web服务器机器上会引发安全性问题

    youdao

  • The lack of a database-level security model makes it difficult to fully leverage ZEO storage servers as clients have more or less unfettered access to the database and must therefore be trusted.

    缺乏数据库级别安全模型使得充分利用ZEO存储服务器变得非常困难因为客户拥有数据库自由访问因此客户端必须信任

    youdao

  • DB2 gives fine-grained control over performance and security characteristics of database access-and demands correspondingly careful attention.

    DB 2数据库访问性能安全特性施加细粒度的控制—因此需要更细致的处理。

    youdao

  • Security is always a concern when you enable Web services access to your database by means of Web services.

    Web服务方式访问数据库时,安全性总是一个值得关注问题。

    youdao

  • Then, this paper deeply investigated the three difficult problems of the system, such as exception handling, security right controlling and heterogeneous database access.

    然后系统三个难点问题——异常处理安全权限控制异构数据库访问进行了深入的研究。

    youdao

  • The essential security technologies of the distributed database are user authentication and access control.

    分布式数据库安全核心技术用户身份验证访问控制

    youdao

  • NET has constructed the school information management system, introduced the system overall design. The database access method and the data security guard measure.

    NET构建了学校信息管理系统本文介绍系统的整体设计数据库访问方法数据安全防范措施

    youdao

  • This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.

    文章分析了SYBASE数据库管理系统安全控制机制基于角色数据访问控制模型

    youdao

  • Application context can be useful for the purposes of enforcing fine-grained access control and enhances the security of database.

    通过实际应用来看,应用上下文技术可以用于提高细粒度访问控制性能,从而提高数据库安全性

    youdao

  • It made information system, from access system to operate database and sign badge, all these things under security control.

    使该所信息系统用户访问系统,操作数据库具体实现签章等工作,处在系统安全控制之下。

    youdao

  • The thesis also analyses the design plan of system database, including its security, transaction management and ADO data access technology.

    然后,论文论述了系统数据库设计过程,其中包括安全性设计、事务管理设计以及ADO数据访问技术的分析及运用。

    youdao

  • This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.

    本文介绍了用户信息系统数据库安全性控制基本概念控制模型,以及在多用户信息系统中安全性控制的实现方法

    youdao

  • There are two aspects included in database system security, which is access control security strategy and communication channel security.

    数据库系统安全性主要包括两个方面访问控制策略传输通道安全

    youdao

  • How can we access the database properly is always the key to improves efficiency of application system, enhances security of database and reduces wastage.

    合理使用访问数据库系统提高应用系统效率增强系统的安全性减少系统损耗非常关键的。

    youdao

  • For security reasons, your web users should only have read access to the database.

    考虑到安全因素网络用户应该允许读取数据库

    youdao

  • For security reasons, your web users should only have read access to the database.

    考虑到安全因素网络用户应该允许读取数据库

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定